-
1
-
-
62949225623
-
Cloud computing and grid computing 360-degree compared
-
IEEE Press, Nov.
-
Foster I, Zhao Y, Raicu I, Lu, S. Cloud Computing and Grid Computing 360-degree compared. Proceedings of the Grid Computing Environments Workshop, GCE 2008; IEEE Press, Nov. 2008, 1-10.
-
(2008)
Proceedings of the Grid Computing Environments Workshop, GCE 2008
, pp. 1-10
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Lu, S.4
-
2
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
Buyya R, Chee Shin Y, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems; 2009;25(6):599-616.
-
(2009)
Future Generation Computer Systems
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Chee Shin, Y.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
3
-
-
77950347409
-
A view of cloud computing
-
Armbrust M, Fox A, Griffith R, Joseph A D, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. A View of Cloud Computing. Communications of the ACM; 2010;53(4):50-58.
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
4
-
-
79954609461
-
The NIST definition of cloud computing
-
Mell P, Grance T. The NIST Definition of Cloud Computing. Communications of the ACM; 2010;53(6):50.
-
(2010)
Communications of the ACM
, vol.53
, Issue.6
, pp. 50
-
-
Mell, P.1
Grance, T.2
-
5
-
-
77953614890
-
Identifying the security risks associated with governmental use of cloud computing
-
Paquette S, Jaeger P T, Wilson S C. Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly; 2010;27(3):245-253.
-
(2010)
Government Information Quarterly
, vol.27
, Issue.3
, pp. 245-253
-
-
Paquette, S.1
Jaeger, P.T.2
Wilson, S.C.3
-
6
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications; 2011;34(1):1-11.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
7
-
-
79751493181
-
Locking the sky: A survey on IaaS cloud security
-
Vaquero L M, Rodero-Merino L, Morán D. Locking the sky: A survey on IaaS cloud security. Computing; 2011;91(1):93-118.
-
(2011)
Computing
, vol.91
, Issue.1
, pp. 93-118
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Morán, D.3
-
8
-
-
79952367895
-
Privacy, security and trust issues arising from cloud computing
-
IEEE Press, Nov.
-
Pearson S, Benameur A. Privacy, security and trust issues arising from cloud computing. Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2010; IEEE Press, Nov. 2010, 693-702.
-
(2010)
Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2010
, pp. 693-702
-
-
Pearson, S.1
Benameur, A.2
-
9
-
-
73149120473
-
Design, analysis, and deployment of omnipresent formal trust model (FTM) with trust bootstrapping for pervasive environments
-
Ahamed S I, Haque M M, Endadul Hoque M, Rahman F, Talukder N. Design, analysis, and deployment of omnipresent formal trust model (FTM) with trust bootstrapping for pervasive environments. Journal of Systems and Software; 2010;83(2):253-270.
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.2
, pp. 253-270
-
-
Ahamed, S.I.1
Haque, M.M.2
Endadul Hoque, M.3
Rahman, F.4
Talukder, N.5
-
10
-
-
78951469672
-
Resource discovery in a grid system: Directing requests to trustworthy virtual organizations based on global trust values
-
Karaoglanoglou K, Karatza H. Resource discovery in a Grid system: Directing requests to trustworthy virtual organizations based on global trust values. Journal of Systems and Software; 2011;84(3):465-478.
-
(2011)
Journal of Systems and Software
, vol.84
, Issue.3
, pp. 465-478
-
-
Karaoglanoglou, K.1
Karatza, H.2
-
11
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
Takabi H, Joshi J B D, Ahn G. Security and privacy challenges in cloud computing environments. IEEE Security & Privacy; 2010;8(6):24-31.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.3
-
13
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Algirdas A, Jean-Claude L, Brian R, Carl L. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing; 2004;1(1):11-33.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Algirdas, A.1
Jean-Claude, L.2
Brian, R.3
Carl, L.4
-
15
-
-
67650320950
-
A survey of computational location privacy
-
Krumm J. A survey of computational location privacy. Personal and Ubiquitous Computing; 2009;13(6):291-399.
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 291-399
-
-
Krumm, J.1
-
16
-
-
76449111367
-
Modeling and evaluation of trust with an extension in semantic web
-
Shekarpour S, Katebi S D. Modeling and evaluation of trust with an extension in semantic web. Journal of Web Semantics; 2010;8(1):26-36.
-
(2010)
Journal of Web Semantics
, vol.8
, Issue.1
, pp. 26-36
-
-
Shekarpour, S.1
Katebi, S.D.2
-
17
-
-
70350675425
-
A mathematical approach towards trust based security in pervasive computing environment
-
IEEE Press, Jun.
-
Iltaf N, Hussain M, Kamran F. A mathematical approach towards trust based security in pervasive computing environment. Proceedings of the Third International Conference and Workshops, ISA 2009; IEEE Press, Jun. 2009, 702-711.
-
(2009)
Proceedings of the Third International Conference and Workshops, ISA 2009
, pp. 702-711
-
-
Iltaf, N.1
Hussain, M.2
Kamran, F.3
|